Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Q1 Labs Enhances Security Monitoring System

The security threats against business-technology systems continue to multiply. Not only do malicious worms and viruses such as Blaster and Bagle continue to wreak havoc, but security pros also must continuously monitor employee network usage for potential policy violations as well as enforce regulations such as the Health Insurance Portability and Accountability Act.

This week security vendor Q1 Labs Inc. enhanced its QRadar application, which monitors users, systems, and applications to spot abnormal and potentially malicious activity. The company also unveiled its QRadar-ICX module, which works with QRadar to stop worms, denial-of-service attacks, and other threats.

Robert Brown, director of information security, privacy, and HIPAA compliance for Borgess Health Alliance Inc., which operates more than 140 patient-care sites and 65 satellite clinics in southern Michigan, says such attacks are increasingly threatening and getting faster. "The time from when a vulnerability is announced to an attack is getting faster, and viruses beat antivirus software updates. We check for new updates every half-hour and we can still be vulnerable," he says.

Borgess has been using QRadar for about eight months, and Brown says he welcomes the QRadar-ICX enhancements. "Anything that can help you make faster decisions" is welcome, he says.

Some of the defensive enhancements QRadar-ICX provides are the ability to isolate and contain infected systems, preventing them from infecting other systems connected to the network. The module can also shut down specific user and application sessions that are being used as part of an attack or that violate a company's security policy. QRadar-ICX can also direct routers and firewalls to help shut down attacks coming from the Internet.

  • 1